Sciweavers

1278 search results - page 185 / 256
» Attack Graph Based Evaluation of Network Security
Sort
View
141
Voted
HPCA
2006
IEEE
16 years 3 months ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
BIBE
2005
IEEE
154views Bioinformatics» more  BIBE 2005»
15 years 9 months ago
Effective Pre-Processing Strategies for Functional Clustering of a Protein-Protein Interactions Network
In this article we present novel preprocessing techniques, based on topological measures of the network, to identify clusters of proteins from Protein-protein interaction (PPI) ne...
Duygu Ucar, Srinivasan Parthasarathy, Sitaram Asur...
139
Voted
AAIM
2007
Springer
118views Algorithms» more  AAIM 2007»
15 years 7 months ago
Significance-Driven Graph Clustering
Abstract. Modularity, the recently defined quality measure for clusterings, has attained instant popularity in the fields of social and natural sciences. We revisit the rationale b...
Marco Gaertler, Robert Görke, Dorothea Wagner
107
Voted
TMC
2008
90views more  TMC 2008»
15 years 3 months ago
Trust-Based Fast Authentication for Multiowner Wireless Networks
In multiowner wireless networks, access points (APs) are owned and operated by different administrations, leading to significant authentication delays during handoff between APs. W...
Jahan Hassan, Harsha Sirisena, Björn Landfeld...
NOMS
2002
IEEE
112views Communications» more  NOMS 2002»
15 years 8 months ago
Paradigms for mobile agent based active monitoring of network systems
We present here a framework together with a set of paradigms for mobile agent based active monitoring of network systems. In our framework mobile agents are used to perform remote...
Anand Tripathi, Tanvir Ahmed, Sumedh Pathak, Megan...